-
obot control, a subject aimed at making robots behave as desired, has been
extensively developed for more than two decades. Among many books being
published on this subject, a common feature is to treat a robot as a single
system that is to be controlled by a variety of control algorithms depending on
different scenarios and control objectives. However, when a robot becomes more
complex and its degrees of freedom of motion increase substantially, the needed
control computation can easily go beyond the scope a modern computer can
handle within a pre-specified sampling period. A solution is to base the control
on subsystem dynamics.
標簽:
decomposition
virtual
control
上傳時間:
2019-09-04
上傳用戶:txb96
-
Abstract—In the future communication applications, users
may obtain their messages that have different importance levels
distributively from several available sources, such as distributed
storage or even devices belonging to other users. This
scenario is the best modeled by the multilevel diversity coding
systems (MDCS). To achieve perfect (information-theoretic)
secrecy against wiretap channels, this paper investigates the
fundamental limits on the secure rate region of the asymmetric
MDCS (AMDCS), which include the symmetric case as a special
case. Threshold perfect secrecy is added to the AMDCS model.
The eavesdropper may have access to any one but not more than
one subset of the channels but know nothing about the sources,
as long as the size of the subset is not above the security level.
The question of whether superposition (source separation) coding
is optimal for such an AMDCS with threshold perfect secrecy
is answered. A class of secure AMDCS (S-AMDCS) with an
arbitrary number of encoders is solved, and it is shown that linear
codes are optimal for this class of instances. However, in contrast
with the secure symmetric MDCS, superposition is shown to
be not optimal for S-AMDCS in general. In addition, necessary
conditions on the existence of a secrecy key are determined as a
design guideline.
標簽:
Fundamental
Limits
Secure
Class
on
of
上傳時間:
2020-01-04
上傳用戶:kddlas
-
Cooperation is not a natural characteristic attributed to humans. The typical human horizon is focused
on short-term gains, which might be due to our instinct-driven subconscious occupying a grander
importance than we dare to admit [1]. Cooperating with other individuals or entities, however, usually
means that short-term losses may translate into long-term gains – something history has proved to
hold true but humans for some reason rarely ever understand.
標簽:
Communications
Cooperative
上傳時間:
2020-05-27
上傳用戶:shancjb
-
Mobile communication has gained significant importance in today’s society. As
of 2010, the number of mobile phone subscribers has surpassed 5 billion [ABI10],
and the global annual mobile revenue is soon expected to top $1 trillion [Inf10].
While these numbers appear promising for mobile operators at first sight, the
major game-changer that has come up recently is the fact that the market is
more and more driven by the demand for mobile data traffic [Cis10].
標簽:
Coordinated
Multi-Point
上傳時間:
2020-05-27
上傳用戶:shancjb
-
This work titled A Digital Phase Locked Loop based Signal and Symbol Recovery
System for Wireless Channel is intended to serve as a document covering funda-
mental concepts and application details related to the design of digital phase locked
loop (DPLL) and its importance in wireless communication. It documents some
of the work done during the last few years covering rudimentary design issues,
complex implementations, and fixing configuration for a range of wireless propa-
gation conditions.
標簽:
Digital
Locked
Phase
Loop
上傳時間:
2020-05-27
上傳用戶:shancjb
-
Radio frequency (RF) power amplifiers are used in everyday life for many applica-
tions including cellular phones, magnetic resonance imaging, semiconductor wafer
processing for chip manufacturing, etc. Therefore, the design and performance of
RF amplifiers carry great importance for the proper functionality of these devices.
Furthermore, several industrial and military applications require low-profile yet
high-powered and efficient power amplifiers.
標簽:
Introduction
Amplifier
Design
Power
to
RF
上傳時間:
2020-05-27
上傳用戶:shancjb
-
Mobile and wireless application development has come a long way in the past few
years. It has progressed beyond the hype of wireless Web applications for consumers
to the reality of high-value mobile applications for corporate users. Opportunities
abound for creating new mobile and wireless applications that provide vital benefits to
any business. A sampling of these benefits includes increased worker productivity,
reduced processing costs, heightened accuracy, and competitive advantage. In contrast
is the concern that developing mobile and wireless applications will involve many new
technologies and concepts that many corporate developers are still learning to use.
標簽:
Essentials
Wireless
Mobile
Design
and
上傳時間:
2020-05-30
上傳用戶:shancjb
-
Radio propagation measurements and channel modelling continue to be of fundamental importance
to radio system design. As new technology enables dynamic spectrum access and higher data rates,
radio propagation effects such as shadowing, the presence of multipath and frequency dispersion
are the limiting factors in the design of wireless communication systems. While there are several
books covering the topic of radio propagation in various frequency bands, there appears to be no
books on radio propagation measurements, which this book addresses at length.
標簽:
Propagation
Measurement
Radio
上傳時間:
2020-06-01
上傳用戶:shancjb
-
The “bottom-line” metrics of cash flow, demand, price, and return on investment
are driven by a second set of financial metrics represented by value to the
customer, cost, and the pace of innovation. Get them right relative to competition
and impressive bottom-line results should follow. Because of their importance, we
call value to the customer, variable cost, and the pace of innovation the
“fundamental metrics.”
標簽:
Planning
Product
Systems
Driven
Value
and
上傳時間:
2020-06-06
上傳用戶:shancjb
-
This is a practical book, to be sure, but it is also a book about hope and posi-
tive change. I am quite sincere. The delivery of electricity is deeply rooted
in the principle of universal access; when clean, reliable energy is available it
contributes to poverty alleviation, improved social conditions, and enhanced
economic development. In the developed world, we know this to be true. The
digital fabric of our lives is a testimony to the importance of energy security.
Across the globe, we have seen the vital contributions that electrification has
brought to the development of economies and an enhanced quality of life.
Nonetheless, this supreme engineering achievement has languished, and we are
deeply challenged.
標簽:
Strategies
Analytics
Data
Big
上傳時間:
2020-06-07
上傳用戶:shancjb